-
Control planes and data planes
AWS separates most services into the concepts of control plane and data plane. These terms come from the world of networking, specifically routers. The router’s data plane, which is its main functionality, is moving packets around based on rules. But the routing policies have to be created and distributed from somewhere, and that’s where the control plane comes…
-
Resident Cloud Architect Program
A six or twelve month subscription that gives you direct access to Google Cloud experts who will work alongside your cloud architecture team to unblock technical challenges, optimize your cloud architecture, maximize your Google Cloud investment, and accelerate your cloud journey.
-
CloudSQL for PostgreSQL
Connect to your Cloud SQL instance (instance ID: myinstance) by running: Insert sample data into the postgres database: Retrieve the data: Postgres Cloud SQL has a default database ‘postgres’
-
CloudSQL for MySQL
The instance ID is the name of the instance. It is used to uniquely identify your instance within the project Connect to your instance with instance ID myinstance: Create a SQL database called guestbook on your Cloud SQL instance: Insert the following sample data into the guestbook database: Now retrieve the data: Switch Database in…
-
Hierarchical firewall policies
-
Metadata
Every virtual machine (VM) instance stores its metadata on a metadata server. Your VM automatically has access to the metadata server API without any additional authorization. Compute Engine maintains the metadata keys and values for your VMs and projects in directories. Each directory stores metadata entries in the form of key-value pairs. Some directories contain…
-
Define a golden image
Sharing custom images: Deny access to non-custom images using a resource manager constraint: DEPRECATE now, then OBSOLETE in 7 days, then DELETE in 14 days:
-
Audit Logging
Google Cloud services write audit logs that record administrative activities and accesses within your Google Cloud resources. To view audit logs, you must have the appropriate IAM permissions and roles: Enable data access logging for cloudsql: > gcloud projects get-iam-policy myproject123 > /tmp/policy.yaml > gcloud projects set-iam-policy myproject123 /tmp/policy.yaml
-
Cross-Cloud Network
-
Cloud NGFW